Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges. There has also been a problem with understanding the patterns of interactions among stakeholders that lead to instituting such an initiative. The overall aim of this research is to enhance understanding of the issues and concerns in shaping strategic information systems security initiative. To be successful, a proper undertaking of the content, context and process of the formulation and institutionalization of a security initiative is essential. It is also important to align the interconnections between these three key components. I...
Successful enforcement of information security requires an understanding of a complex interplay of s...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
The success of an information security program is heavily dependent upon actions of organizational m...
This thesis argues that organizational power impacts the development and implementation of Informati...
The human factor has been detected as the weakest link in the information security of organizations....
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Information security is no longer just about security. Today, security is about resource and informa...
This paper investigates the interrelationship and effect of trust and culture on the level of goal s...
Scholars and security practitioners seem to converge in the understanding that Information Security ...
This dissertation is composed by three essays that explore the relationship between good IT governan...
Many organizations still rely on deterrence to control insider threats and on purely preventive stra...
A fundamental understanding of the complexities comprising an information security strategy (ISS) in...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Abstract: A large part of information systems (IS) security approaches is technical in nature with l...
Successful enforcement of information security requires an understanding of a complex interplay of s...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
The success of an information security program is heavily dependent upon actions of organizational m...
This thesis argues that organizational power impacts the development and implementation of Informati...
The human factor has been detected as the weakest link in the information security of organizations....
© 2018 Craig Andrew HorneThe research topic under investigation in this thesis is information securi...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Information security is no longer just about security. Today, security is about resource and informa...
This paper investigates the interrelationship and effect of trust and culture on the level of goal s...
Scholars and security practitioners seem to converge in the understanding that Information Security ...
This dissertation is composed by three essays that explore the relationship between good IT governan...
Many organizations still rely on deterrence to control insider threats and on purely preventive stra...
A fundamental understanding of the complexities comprising an information security strategy (ISS) in...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Abstract: A large part of information systems (IS) security approaches is technical in nature with l...
Successful enforcement of information security requires an understanding of a complex interplay of s...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
The success of an information security program is heavily dependent upon actions of organizational m...